Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Cybertax: Managing the Risks and Results by George K. Tsantes 9781032360676
RRP: £14.99£13.58Unique selling point: Manage cybersecurity as a business risk Core audience: IT managers and executives Place in the market: Professional tradeBook InformationISBN 9781032360676Author George K. TsantesFormat PaperbackPage Count 118Imprint Taylor &... -
Computer Security: Principles and Practice by William Stallings 9780134794105
RRP: £128.39£118.45For courses in computer/network security Balancing principle and practice-an updated survey of the fast-moving world of computer and network security Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network... -
Secure, Resilient, and Agile Software Development by Mark Merkow 9781032475011
RRP: £42.99£37.59A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to... -
Think Like a Terrorist to Combat Terrorism and Radicalization in Prison by William P Sturgeon 9781032259796
RRP: £45.99£40.13Think Like a Terrorist to Combat Terrorism and Radicalization in Prison provides guidelines for hardening facilities, training staff, preparing for radicalized-terrorist inmates' incarceration, and monitoring these inmates after their release. The book... -
Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic by Ravi Das 9781032245324
RRP: £105.00£90.86The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given... -
Security Risk Management - The Driving Force for Operational Resilience: The Firefighting Paradox by Jim Seaman 9781032263885
RRP: £110.00£95.51The importance of businesses being ‘operationally resilient’ is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can ‘bounce back’ from or manage to evade impactful... -
Cybersecurity Public Policy: SWOT Analysis Conducted on 43 Countries by Bradley Fowler 9781032194332
RRP: £115.00£99.36Since 2000, many governments, parliaments, and ministries have worked diligently to define effective guidelines and recommendations to safeguard public and private sector information systems and information assets from unwanted cyberattacks and... -
Controlling Privacy and the Use of Data Assets: Who Owns the New Oil? by Ulf Mattsson 9781032039121
RRP: £56.99£49.41"Ulf Mattsson leverages his decades of experience as a CTO and security expert to show how companies can achieve data compliance without sacrificing operability." Jim Ambrosini, CISSP, CRISC, Cybersecurity Consultant and Virtual CISO"Ulf Mattsson lays... -
Security Awareness Design in the New Normal Age by Wendy F. Goucher 9781032047645
RRP: £59.99£51.93People working in our cyber world have access to a wide range of information including sensitive personal or corporate information which increases the risk to it. One of the aspects of the protection of this data is to train the user to behave more... -
Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic by Ravi Das 9780367685737
RRP: £38.99£31.98The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given... -
Cyberpredators and Their Prey by Lauren Shapiro 9780367551711
RRP: £105.00£90.86The online environment has emerged as a continuous and unfettered source of interpersonal criminal activity beyond physical boundaries. Cyberpredators commit their crimes by employing the Internet and online services-social network platforms, online... -
Cyberpredators and Their Prey by Lauren Shapiro 9780367551698
RRP: £47.99£41.81The online environment has emerged as a continuous and unfettered source of interpersonal criminal activity beyond physical boundaries. Cyberpredators commit their crimes by employing the Internet and online services-social network platforms, online... -
Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust? by Ulf Mattsson 9781032185187
RRP: £38.99£34.22The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity and Ledger and will provide practical lessons in Data Integrity,... -
Cyber Arms: Security in Cyberspace by Stanislav Abaimov 9780367895853
RRP: £71.99£62.05This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive... -
Advanced Smart Computing Technologies in Cybersecurity and Forensics by Keshav Kaushik 9780367686505
RRP: £91.99£79.80This book addresses the topics related to artificial intelligence, internet of things, blockchain technology, and machine learning and brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics. The first... -
Advanced Cybersecurity Technologies by Ralph Moseley 9780367562274
RRP: £130.00£112.11Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human... -
Multimodal Biometric Systems: Security and Applications by Rashmi Gupta 9780367685560
RRP: £135.00£117.28Several governments around the world are calling for the use of biometric systems to be used to deliver crucial societal functions, therefore making it an urgent need to act. The current performance of some biometric systems regarding the combination of... -
Mind the Tech Gap: Addressing the Conflicts between IT and Security Teams by Nikki Robinson 9781032206165
RRP: £99.99£86.60IT and cybersecurity teams have had a long-standing battle between functionality and security. But why? To understand where the problem lies, this book will explore the different job functions, goals, relationships, and other factors that may impact how... -
What Every Engineer Should Know About Cyber Security and Digital Forensics by Joanna F. DeFranco 9781032146010
RRP: £115.00£99.36Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security... -
Controlling Privacy and the Use of Data Assets - Volume 2: What is the New World Currency – Data or Trust? by Ulf Mattsson 9781032185163
RRP: £56.99£49.81The book will review how new and old privacy-preserving techniques can provide practical protection for data in transit, use, and rest. We will position techniques like Data Integrity and Ledger and will provide practical lessons in Data Integrity,... -
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing by Ahmed Sheikh 9781484272572
RRP: £54.99£19.40Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam-a qualification that tests the cybersecurity professional's baseline... -
Creating an Information Security Program from Scratch by Walter Williams 9780367554644
RRP: £130.00£112.11This book is written for the first security hire in an organization; either an individual moving into this role from within the organization or hired into the role. More and more organizations are realizing that Information Security requires a dedicated... -
Cyber Forensics: Examining Emerging and Hybrid Technologies by Al Marcella 9780367524180
RRP: £105.00£90.86Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to... -
Digital Privacy and Security Using Windows: A Practical Guide by Nihad A. Hassan 9781484227985
RRP: £54.99£42.75Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques... -
Hacking: Full Hacking Guide for Beginners With 30 Useful Tips. All You Need To Know About Basic Security: (How to Hack, Computer Hacking, Hacking for Beginners, Basic Security, Penetration Testing) by Jimnah Wood 9781517245399
RRP: £8.95£7.29Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781517245399Author Jimnah WoodFormat PaperbackPage Count 26Imprint Createspace Independent Publishing PlatformPublisher Createspace Independent Publishing... -
CompTIA Security+ Certification Study Guide: Network Security Essentials by Ahmed F. Sheikh 9781484262337
RRP: £54.99£39.87Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security. Computer network vulnerabilities and threats... -
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions by Thomas J. Mowbray 9781118697115
RRP: £47.50£41.81A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code,... -
NIST Special Publication 800-53 Information Security by National Institute of Standards and Tech
RRP: £9.95£9.73Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781461112358Author National Institute of Standards and TechFormat PaperbackPage Count 240Imprint Createspace Independent Publishing PlatformPublisher... -
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber
RRP: £64.99£47.66See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your... -
Hacking: Ultimate Hacking for Beginners, How to Hack by Senior Lecturer Andrew McKinnon
RRP: £15.99£13.65Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781514125335Author Senior Lecturer Andrew McKinnonFormat PaperbackPage Count 212Imprint Createspace Independent Publishing PlatformPublisher Createspace... -
Quantum Algorithms for Cryptographically Significant Boolean Functions: An IBMQ Experience by Tharrmashastha SAPV
RRP: £54.99£52.35This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties... -
Information Security and Optimization by Rohit Tanwar
RRP: £105.00£90.86Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and... -
Enhancing Business Continuity and IT Capability: System Administration and Server Operating Platforms by Nijaz Bajgorić
RRP: £89.99£78.09Enterprise servers play a mission-critical role in modern computing environments, especially from a business continuity perspective. Several models of IT capability have been introduced over the last two decades. Enhancing Business Continuity and IT... -
Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture by Professor Sandeep Kumar Shukla
RRP: £96.99£84.05Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with knowledge of the standard architecture of enterprise security, tools are often used... -
Security in Computing by Charles Pfleeger
RRP: £95.24£71.08The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying... -
Cybersecurity: A Practical Engineering Approach by Henrique M. D. Santos
RRP: £66.99£57.83Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification... -
Security in Vehicular Networks: Focus on Location and Identity Privacy by Leila Benarous
RRP: £125.00£108.95Sorry no description is available for this book at this time. -
Intelligent Security Management and Control in the IoT by Mohamed-Aymen Chalouf
RRP: £125.00£107.86Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781789450538Author Mohamed-Aymen ChaloufFormat HardbackPage Count 320Imprint ISTE LtdPublisher ISTE Ltd -
Exploring Malicious Hacker Communities: Toward Proactive Cyber Defence by Ericsson Marin
RRP: £53.99£48.48Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9781108491594Author Ericsson MarinFormat HardbackImprint Cambridge University PressPublisher Cambridge University Press -
Guide to Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach by Maamar Ouladj
RRP: £54.99£31.26It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book...